Application security encompasses measures taken to improve the security of an application often by finding, fixing and preventing security vulnerabilities. From the risk management strategic point of view, the mitigation of application security risks is not a one time exercise;[…]
Many of your company’s most valuable assets are at risk to criminal activities carried out on the Dark Web – and you don’t even know it. Turning a blind eye to this will impact your: Brand and reputation Customer loyalty[…]
Canada’s First Cybersecurity Law | BILL C-59 – Secure Knowledge Management SUMMARY Part 1 enacts the National Security and Intelligence Review Agency Act, which establishes the National Security and Intelligence Review Agency and sets out its composition, mandate and powers. It repeals the[…]
List of Free Hacking books PDF. Ethical Hacking, Hacking books pdf, Hacking ebooks free download, hacking ebooks collection, Best Hacking eBooks. This list for everyone who is interested in ethical hacking, beginners or professionals both. These top 100 hacking books[…]
Here is my personal collection of IP addresses engaging in abusive behavior on the networks, for webmasters and sysadmins to block IP addresses engaging in abusive behavior on their networks.
Live webinar: http://goo.gl/VVKxS3 Way back in 2000 it was common practice to spend considerable time configuring and tinkering the plumbing of what we today call cyberspace. The technology was embryonic, immature and often hours were spent ensuring nothing broke and[…]
Basic rate-limiting middleware for Express. Use to limit repeated requests to public APIs and/or endpoints such as password reset. A brute-force protection middleware for express routes that rate-limits incoming requests, increasing the delay with each request in a fibonacci-like sequence[…]
The first steps towards GDPR compliance are understanding your obligations, what your current processes are and identifying any gaps. Undertaking a data protection audit is essential to achieving compliance. This checklist is intended to provide a starting point, rather than[…]
Today, the best hackers in the world competed in the Global CyberLympics final during Cyber Security Week in The Hague. This is an international online hacking competition aimed at improving the level of national cyber security and strengthening international cooperation[…]
There is no excerpt because this is a protected post.
|--Although you should be able to work out who I am, I don't really care, as I can work out who you are. So beware of leaving footprints.--|